Diagram 2

 

Data privacy application procedure (Author's work)

Comments